MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f25cf2ad4299df6cf65790e043f4aa0064cc00eb17ed02b910de29ce99ca31dd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RemcosRAT


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: f25cf2ad4299df6cf65790e043f4aa0064cc00eb17ed02b910de29ce99ca31dd
SHA3-384 hash: 0203fb1ecc99607981425a5332e6b06c88c79ef472600bfcfa619bc9695c2cac24b56b0f035e1f6d7e4d6a0d9a6de401
SHA1 hash: 92468b452235e837f11682d61122134adc26d8ec
MD5 hash: 74abdb77055ac434b1c9f486d497ff0c
humanhash: network-social-alanine-music
File name:Booking vouchers.rar
Download: download sample
Signature RemcosRAT
File size:526'053 bytes
First seen:2021-03-10 06:59:35 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 12288:AiKNEouuKrDyQOTJusZdo68NIsvzLvJAWsRq7ifqVOPXP+MY5ahcgia:AiJouuKr9kfSmsJAWsYuf6OP/6ahga
TLSH CDB42360D93DC5507B389FBD400F64598D137BF91C90AD886DAEF91AB27E522023DB8E
Reporter abuse_ch
Tags:rar RAT RemcosRAT


Avatar
abuse_ch
Malspam distributing RemcosRAT:

HELO: franceloc-postfix.filnet.fr
Sending IP: 194.187.193.118
From: Marmot Tours <info@wip-hausschutz.de>
Reply-To: hg.virtucycling@gmail.com
Subject: Group rooming list PT 1422
Attachment: Booking vouchers.rar (contains "Booking vouchers.exe")

RemcosRAT C2:
donjon555.hopto.org:2404 (185.19.85.134)

% Information related to '185.19.84.0 - 185.19.85.255'

% Abuse contact for '185.19.84.0 - 185.19.85.255' is 'abuse@datawire.ch'

inetnum: 185.19.84.0 - 185.19.85.255
netname: DATAWIRE-DATACENTERS
descr: CUSTOMERS ZG01
country: CH
admin-c: DA4314-RIPE
tech-c: DA4314-RIPE
status: ASSIGNED PA
mnt-by: DATAWIRE-NOC
created: 2013-09-23T14:18:55Z
last-modified: 2013-09-23T14:18:55Z
source: RIPE

Intelligence


File Origin
# of uploads :
1
# of downloads :
143
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Wacatac
Status:
Malicious
First seen:
2021-03-10 07:00:10 UTC
AV detection:
4 of 47 (8.51%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RemcosRAT

rar f25cf2ad4299df6cf65790e043f4aa0064cc00eb17ed02b910de29ce99ca31dd

(this sample)

  
Dropping
RemcosRAT
  
Delivery method
Distributed via e-mail attachment

Comments